Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.139.208.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53540
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.139.208.151.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 06:51:39 CST 2025
;; MSG SIZE  rcvd: 108
Host info
151.208.139.145.in-addr.arpa domain name pointer 145.139.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
151.208.139.145.in-addr.arpa	name = 145.139.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.196.72.11 attackspambots
Jan 11 21:07:35 sigma sshd\[10125\]: Invalid user raf from 5.196.72.11Jan 11 21:07:36 sigma sshd\[10125\]: Failed password for invalid user raf from 5.196.72.11 port 52836 ssh2
...
2020-01-12 06:05:51
185.176.27.122 attackbotsspam
01/11/2020-22:55:35.164053 185.176.27.122 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-12 06:00:34
222.186.190.2 attackbots
Jan 11 23:29:51 ovpn sshd\[17687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Jan 11 23:29:53 ovpn sshd\[17687\]: Failed password for root from 222.186.190.2 port 31850 ssh2
Jan 11 23:30:04 ovpn sshd\[17687\]: Failed password for root from 222.186.190.2 port 31850 ssh2
Jan 11 23:30:07 ovpn sshd\[17687\]: Failed password for root from 222.186.190.2 port 31850 ssh2
Jan 11 23:30:10 ovpn sshd\[17799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-01-12 06:31:30
204.12.197.234 attackbots
20 attempts against mh-misbehave-ban on milky.magehost.pro
2020-01-12 06:14:53
113.186.30.66 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-01-12 06:20:44
50.252.47.29 attackspambots
Honeypot attack, port: 81, PTR: 50-252-47-29-static.hfc.comcastbusiness.net.
2020-01-12 06:31:01
112.3.30.47 attackbotsspam
Lines containing failures of 112.3.30.47
Jan  7 13:55:27 kmh-vmh-001-fsn05 sshd[31532]: Invalid user oxh from 112.3.30.47 port 37726
Jan  7 13:55:27 kmh-vmh-001-fsn05 sshd[31532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.47 
Jan  7 13:55:30 kmh-vmh-001-fsn05 sshd[31532]: Failed password for invalid user oxh from 112.3.30.47 port 37726 ssh2
Jan  7 13:55:32 kmh-vmh-001-fsn05 sshd[31532]: Received disconnect from 112.3.30.47 port 37726:11: Bye Bye [preauth]
Jan  7 13:55:32 kmh-vmh-001-fsn05 sshd[31532]: Disconnected from invalid user oxh 112.3.30.47 port 37726 [preauth]
Jan  7 14:19:11 kmh-vmh-001-fsn05 sshd[3253]: Invalid user mirko from 112.3.30.47 port 45122
Jan  7 14:19:11 kmh-vmh-001-fsn05 sshd[3253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.47 
Jan  7 14:19:13 kmh-vmh-001-fsn05 sshd[3253]: Failed password for invalid user mirko from 112.3.30.47 port 45122 ss........
------------------------------
2020-01-12 06:30:16
139.59.46.243 attack
Jan 11 21:07:24 marvibiene sshd[60410]: Invalid user sa from 139.59.46.243 port 33364
Jan 11 21:07:24 marvibiene sshd[60410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.46.243
Jan 11 21:07:24 marvibiene sshd[60410]: Invalid user sa from 139.59.46.243 port 33364
Jan 11 21:07:26 marvibiene sshd[60410]: Failed password for invalid user sa from 139.59.46.243 port 33364 ssh2
...
2020-01-12 06:12:37
174.138.56.93 attackbots
SSH Brute-Force attacks
2020-01-12 06:11:51
106.54.141.8 attackbotsspam
Jan 11 23:01:52 meumeu sshd[25711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.141.8 
Jan 11 23:01:53 meumeu sshd[25711]: Failed password for invalid user ubnt from 106.54.141.8 port 38496 ssh2
Jan 11 23:07:33 meumeu sshd[26727]: Failed password for root from 106.54.141.8 port 51002 ssh2
...
2020-01-12 06:13:37
103.193.240.187 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-12 06:29:15
221.215.115.116 attackbotsspam
Unauthorised access (Jan 11) SRC=221.215.115.116 LEN=40 TTL=49 ID=21573 TCP DPT=23 WINDOW=20766 SYN
2020-01-12 06:01:29
222.186.180.8 attackbotsspam
Jan 11 23:20:20 jane sshd[8359]: Failed password for root from 222.186.180.8 port 37356 ssh2
Jan 11 23:20:25 jane sshd[8359]: Failed password for root from 222.186.180.8 port 37356 ssh2
...
2020-01-12 06:24:03
74.12.44.116 attack
Honeypot attack, port: 5555, PTR: bmtnon3749w-lp130-02-74-12-44-116.dsl.bell.ca.
2020-01-12 06:36:49
113.161.1.111 attackspam
Jan 11 23:16:55 meumeu sshd[28260]: Failed password for root from 113.161.1.111 port 51552 ssh2
Jan 11 23:19:49 meumeu sshd[28777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.1.111 
Jan 11 23:19:50 meumeu sshd[28777]: Failed password for invalid user os from 113.161.1.111 port 35915 ssh2
...
2020-01-12 06:28:49

Recently Reported IPs

233.14.27.87 221.233.203.153 73.106.179.233 241.100.188.163
140.40.49.79 255.10.97.106 27.18.251.244 224.77.153.57
242.104.209.154 251.38.106.124 118.145.168.216 195.227.12.95
206.191.254.219 154.197.17.117 175.96.100.235 103.250.138.36
130.186.55.38 130.217.186.44 236.64.73.14 118.27.182.49